{"id":8,"date":"2026-02-12T19:12:35","date_gmt":"2026-02-12T19:12:35","guid":{"rendered":"https:\/\/student.wp.odu.edu\/tboon015\/?page_id=8"},"modified":"2026-02-13T04:21:02","modified_gmt":"2026-02-13T04:21:02","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/tboon015\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p>Cybersecurity is not only a technical issue but is also a social issue. Many cybersecurity threats are influenced by human behavior, policy decisions, and ethical constraints.<\/p>\n\n\n\n<p>Data breaches show how vulnerable personal information can be. Breaches impact individuals, businesses, and governments. Social sciences help us understand how users respond to different cyber threats and how better public awareness can help reduce risk.<\/p>\n\n\n\n<p>Human factors such as phishing, weak passwords, and social engineering attacks demonstrate that psychology plays a major role in cybersecurity. Understanding user behavior is a key part to improving digital safety.<\/p>\n\n\n\n<p>Cybersecurity also raises important ethical questions about privacy, surveillance, and digital rights. Governments and organizations must balance security with many civil liberties. Overall, cybersecurity connects technology with sociology, psychology, economics, and law.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The three images below reflect my understanding of how cybersecurity is connected to the social sciences. They highlight the importance of privacy protection, awareness of data breaches, and the role of human behavior in digital security.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO1-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"957\" height=\"716\" src=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO1-1.png\" alt=\"\" class=\"wp-image-24\" srcset=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO1-1.png 957w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO1-1-300x224.png 300w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO1-1-768x575.png 768w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO1-1-600x449.png 600w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO1-1-945x707.png 945w\" sizes=\"(max-width: 957px) 100vw, 957px\" \/><\/a><\/figure>\n\n\n\n<p>Image Source: <em>Data Breach Word Cloud<\/em>, Dreamstime. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.dreamstime.com\/data-breach-word-cloud-exploring-key-concepts-cybersecurity-privacy-threats-highlighting-risks-hacking-malware-digital-image385163539\">https:\/\/www.dreamstime.com\/data-breach-word-cloud-exploring-key-concepts-cybersecurity-privacy-threats-highlighting-risks-hacking-malware-digital-image385163539<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"591\" src=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO2-1024x591.png\" alt=\"\" class=\"wp-image-25\" srcset=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO2-1024x591.png 1024w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO2-300x173.png 300w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO2-768x443.png 768w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO2-600x346.png 600w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO2-945x545.png 945w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/PHOTO2.png 1480w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Image Source: Pinterest, image posted at<\/p>\n\n\n\n<p><a href=\"https:\/\/i.pinimg.com\/originals\/9f\/43\/c5\/9f43c5a147c109daf74a8d3b14621229.jpg\">https:\/\/i.pinimg.com\/originals\/9f\/43\/c5\/9f43c5a147c109daf74a8d3b14621229.jpg<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/Cybersecurity-Concept-Map-Template-Google-Slides-PowerPoint.png\"><img loading=\"lazy\" decoding=\"async\" width=\"789\" height=\"592\" src=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/Cybersecurity-Concept-Map-Template-Google-Slides-PowerPoint.png\" alt=\"\" class=\"wp-image-28\" srcset=\"https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/Cybersecurity-Concept-Map-Template-Google-Slides-PowerPoint.png 789w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/Cybersecurity-Concept-Map-Template-Google-Slides-PowerPoint-300x225.png 300w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/Cybersecurity-Concept-Map-Template-Google-Slides-PowerPoint-768x576.png 768w, https:\/\/student.wp.odu.edu\/tboon015\/wp-content\/uploads\/sites\/40783\/2026\/02\/Cybersecurity-Concept-Map-Template-Google-Slides-PowerPoint-600x450.png 600w\" sizes=\"(max-width: 789px) 100vw, 789px\" \/><\/a><\/figure>\n\n\n\n<p>Image Source: <em>Cybersecurity Concept Map Template<\/em>, HighFile.com<\/p>\n\n\n\n<p><a href=\"https:\/\/www.highfile.com\/cybersecurity-concept-map-template\/\">https:\/\/www.highfile.com\/cybersecurity-concept-map-template\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is not only a technical issue but is also a social issue. Many cybersecurity threats are influenced by human behavior, policy decisions, and ethical constraints. Data breaches show how vulnerable personal information can be. Breaches impact individuals, businesses, and&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/tboon015\/cyse-201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31984,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/tboon015\/wp-json\/wp\/v2\/pages\/8"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/tboon015\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/tboon015\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tboon015\/wp-json\/wp\/v2\/users\/31984"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tboon015\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":4,"href":"https:\/\/student.wp.odu.edu\/tboon015\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":29,"href":"https:\/\/student.wp.odu.edu\/tboon015\/wp-json\/wp\/v2\/pages\/8\/revisions\/29"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/tboon015\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}